Providing a network address is disclosed. A communication indicating that a first node desires to communicate via a packet data network with a second node configured to provide access to a private resource is received. A non-publicly advertised packet data network address usable to communicate with the second node via the packet data network is provided to the first node.
|
1. A method of providing a network address, comprising:
receiving, at a registration server from a base transceiver station, a communication indicating that the base transceiver station desires to communicate, via a packet data network, with a gateway configured to provide access for the base transceiver station to a base station controller, wherein
the gateway is communicatively disposed between the packet data network and the base station controller,
the registration server and the gateway are communicatively coupled to the packet data network,
the registration server and the gateway are communicatively coupled to each other over a secure connection that is separate from the packet data network; and
sending, from the registration server to the base transceiver station, a non-publicly advertised packet data network address usable to communicate with the gateway via the packet data network.
2. The method according to
3. The method according to
selecting a key at the registration server using the unique identifier; and
computing an answer using the key and the random number that is sent to the base transceiver station.
4. The method according to
sending the answer and a second random number from the registration server to the base transceiver station.
5. The method according to
computing a response that is sent to the registration server by the base transceiver station using a second key stored in a smart card installed in the base transceiver station and the second random number.
6. The method according to
generating session keys by the registration server; sending the session keys to the base transceiver station over the packet data network and to the gateway over the secure connection that is separate from the packet data network, wherein the non-publicly advertised packet data network address is an IP address of the gateway; and
sending the IP address of the gateway by the registration server to the base transceiver station over the packet data network.
7. The method according to
securely communicating with the gateway by the base transceiver station using the session keys and the IP address of the gateway.
8. The method according to
securely communicating the base transceiver station and the gateway with the base station controller;
aggregating data at the gateway from a plurality of base transceiver stations;
communicating the aggregated data through a single physical port of the base station controller; and
presenting the plurality of base transceiver stations by the gateway as a single logical base transceiver station to the base station controller.
9. The method according to
10. The method according to
registering the plurality of base transceiver stations with the registration server to obtain new session keys.
11. The method according to
12. The method according to
securely communicating signaling or non-voice data between the base transceiver station and the gateway using SCTP over IP-SEC.
13. The method according to
sending the session keys by the registration server to the base transceiver station over the packet data network that is a public data network;
sending the session keys by the registration server to the gateway over a secure connection that is a private and direct connection between the registration server and the gateway;
communicatively disposing a firewall between the packet data network and the gateway;
communicatively disposing the firewall between the packet data network and the registration server; and
communicatively disposing the packet data network between the firewall and the plurality of base transceiver stations.
14. The method according to
15. The method according to
receiving an indication that the non-publicly advertised packet data network address is no longer usable to access the gateway; and
auto-discovering a second non-publicly advertised packet data network address from the registration server.
16. The method according to
receiving an indication that the non-publicly advertised packet data network address is no longer usable to access the gateway;
receiving an indication that a second non-publicly advertised address is usable to access the base station controller; and
sending the second non-publicly advertised address to the base transceiver station.
17. The method according to
communicating the base transceiver station with the base station controller through the Internet and the gateway; and
communicating the base transceiver station with the registration server without communicating with the gateway and without communicating with the base station controller.
18. The method according to
19. The method according to
configuring the gateway to receive inbound mobile network data over the packet data network from a plurality of base transceiver stations, to aggregate the received inbound mobile network data, and to provide the aggregated inbound mobile network data to the base station controller using time division multiplexing over a single dedicated line; and
representing the aggregated inbound mobile network data as coming from a single logical base transceiver station.
20. The method according to
configuring the gateway to present a plurality of base transceiver stations to the base station controller as a single logical base transceiver station; and
configuring the gateway to interface with different types of base station controllers from different vendors.
21. The method according to
configuring the gateway to map first communications received from the base station controller to respective base transceiver stations and to map second communications received from a plurality of base transceiver stations to a single logical base transceiver station prior to forwarding the second communications to the base station controller.
22. The method according to
23. The method according to
installing a smart card in the base transceiver station;
provisioning the base transceiver station with a URL of the registration server and a key when a smart card is installed in the base transceiver station, wherein the smart card provisions the URL of the registration server and the key to the base transceiver station; and
looking up the key by the registration server based on an identity of the base transceiver station.
24. The method according to
upon initial installation of the smart card, requesting an IP address by the base station transceiver for itself;
using the URL of the registration server that is provisioned by the smart card to contact the registration server; and
the base transceiver station communicating with the registration server before being allowed to access the gateway and before being allowed to access the base station controller.
25. The method according to
|
This application is a continuation of co-pending U.S. patent application Ser. No. 11/516,470, entitled AUTHENTICATING MOBILE NETWORK PROVIDER EQUIPMENT filed Sep. 5, 2006, which is incorporated herein by reference for all purposes, and which claims priority to U.S. Provisional Patent Application No. 60/765,259 entitled AUTHENTICATING MOBILE NETWORK PROVIDER EQUIPMENT filed Feb. 3, 2006, which is incorporated herein by reference for all purposes.
Traditionally mobile network base transceiver stations (BTS) have exchanged data with the core mobile network via a dedicated, high capacity connection to an associated base station controller (BSC), e.g., a dedicated T-1/E-1 line. In some cases, it may be desirable to use an IP or other packet data network to enable a BTS to exchange data with a BSC. However, care must be taken to protect from abuse or attack, such as denial of service (DoS) attack, critical mobile network elements to which an authorized BTS may be configured and/or required to communicate via a packet data network. In addition, there is a need for a way to enable a BTS to find quickly the packet data network address and/or other information required to connect to the core mobile network via a packet data network, without requiring that each such BTS be separately provisioned with such information and without exposing such information to the general public and/or in a manner that could lead to abuse or attack.
Various embodiments of the invention are disclosed in the following detailed description and the accompanying drawings.
The invention can be implemented in numerous ways, including as a process, an apparatus, a system, a composition of matter, a computer readable medium such as a computer readable storage medium or a computer network wherein program instructions are sent over optical or communication links. In this specification, these implementations, or any other form that the invention may take, may be referred to as techniques. A component such as a processor or a memory described as being configured to perform a task includes both a general component that is temporarily configured to perform the task at a given time or a specific component that is manufactured to perform the task. In general, the order of the steps of disclosed processes may be altered within the scope of the invention.
A detailed description of one or more embodiments of the invention is provided below along with accompanying figures that illustrate the principles of the invention. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. Numerous specific details are set forth in the following description in order to provide a thorough understanding of the invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details. For the purpose of clarity, technical material that is known in the technical fields related to the invention has not been described in detail so that the invention is not unnecessarily obscured.
Auto-discovery of a network address is disclosed. In some embodiments, a first mobile network equipment, such as a BTS, is configured to connect to the mobile network by communicating via a packet data network with an access node, such as a gateway. In some embodiments, the BTS is configured to register with a registration server (RS) at a public (e.g., IP) address associated with the RS and subsequently to access the core mobile network via an aggregation gateway (AGW) at a non-publicly advertised address associated with the AGW. The disclosed approach makes it significantly more difficult to mount a denial of service attack on the AGW. In addition, configuring the BTS to register with the RS and obtain from the RS an IP address for an AGW to service the BTS eliminates the need to separately provision each BTS with information regarding its servicing AGW and/or configuring the BTS to resolve a URL or other name to obtain an IP (or other packet data network) address for the servicing AGW.
In some embodiments, AGW 214 is configured to present two or more physical base transceiver stations to the BSC as a single logical BTS, to more efficiently use BSC resources in situations in which each BTS serves a relatively small service area and/or number of users. In some embodiments, AGW 214 is configured to map communications received from the BSC to the correct physical BTS and conversely to map communications received from two or more physical base transceiver stations to a single logical BTS prior to forwarding such inbound communications to the BSC.
Registration server 216 is configured to be used to register a BTS and/or other provider equipment with the network, e.g., to authenticate the equipment prior to providing to the equipment one or more session keys to be used in secure communication protocols, identifying (e.g., address) information for other network elements, such as AGW 214, etc.
Each BTS in the mobile network 200 shown in
While the example shown in
In some embodiments, BTS 304 includes an “equipment identity module” similar to a “subscriber identity module” (SIM), which is a specially-programmed “smart card” with a standards-based small form factor, used in GSM mobile networks to securely store and provision a mobile equipment such as a phone. In GSM phones, for example, a SIM includes a secret (e.g., key) stored in the SIM at its manufacture in a manner that cannot be read out from the SIM or otherwise discovered (e.g., by physically disassembling the SIM) once the manufacturing process has been completed, because attempts to access the secret destroy the SIM and the secret it embodies. When a GSM phone enters a new service area, the SIM data is used to authenticate the phone to the network, identifying the subscriber to the network. In some embodiments, BTS 304 includes and/or is configured and/or provisioned by installing an EIM (or other smart card or other device embodying and/or storing a key or other secret that the EIM cannot be made to provide as output and which is configured to use the secret to perform a cryptographic function). The secret and its association with the EIM (e.g., by serial or other identifying number and/or name) are recorded at the time the EIM is manufactured, so that the secret embodied in and/or stored on the EIM is shared in a secure way between a BTS on which the EIM is installed and an RS configured to know the shared secret. The secret is used to authenticate the BTS to the mobile network (via the RS) and to authenticate the RS to the BTS, e.g., via a challenge and response, as described more fully below. In some embodiments, a uniform resource locator (URL) or other locator and/or address for the RS is programmed and/or otherwise embodied in the EIM. The URL or other locator and/or address is used in some embodiments to enable the BTS to authenticate itself to the network via a central RS and through contact with the RS to discover an address/locator for a servicing aggregation gateway (AGW) or other node, enabling the BTS (or other equipment) to automatically discover locator/address information for a servicing AGW (or other node). Such auto-discovery eliminates the need to provision the BTS or other equipment by configuring it with the locator/address for the AGW or other node, and lessens the burden associated with changing the locator/address for the AGW or other node, since the BTS or other equipment serviced by the AGW or other node would not have to be reconfigured and instead could auto-discover the new locator/address information from the RS. The preceding approach also allows the locator/address for the AGW and/or other node to be kept hidden from disclosure to the general public, reducing significantly the possibility that the AGW or other node will be subjected to a denial of service type of attack, e.g., via a packet-based or other public network used by the BTS to communicate with the AGW in some embodiments.
In some embodiments, making the IP address of the RS but not that of the AGW publicly available (e.g., via a DNS query) protects the AGW against a denial of service or similar attack. In some embodiments, communication between a BTS and RS is infrequent (e.g., once a day), especially after initial BTS startup, and the nature of the communication between a BTS and RS is such that a relatively short term disruption of communication typically will not affect core network operations. By contrast, a successful denial of service attack on the AGW could disrupt the timely transmission and receipt of call data, thereby disrupting core services. In some embodiments, the RS and AGW are provided on the same physical system, and in some such embodiments, the physical system has a separate IP address for each.
Although the foregoing embodiments have been described in some detail for purposes of clarity of understanding, the invention is not limited to the details provided. There are many alternative ways of implementing the invention. The disclosed embodiments are illustrative and not restrictive.
Zhang, Yan, Sukumaran, Jayesh, Stevens, William M., Wahlstrom, Donald P., Passarella, Rossano
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
5729537, | Jun 14 1996 | TELEFONAKTIEBOLAGET L M ERICSSON PUBL | Method and apparatus for providing anonymous data transfer in a communication system |
7263076, | Oct 09 2004 | RATEZE REMOTE MGMT L L C | System and method for managing a wireless network community |
7831237, | Feb 03 2006 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Authenticating mobile network provider equipment |
20020012433, | |||
20030058818, | |||
20040192211, | |||
20040224667, | |||
20050079869, | |||
20050101295, | |||
20050124345, | |||
20050130654, | |||
20060009247, | |||
20060079205, | |||
20070173229, | |||
20080081592, | |||
20080104399, | |||
20080119187, | |||
20080160959, | |||
20080293377, | |||
20090239502, | |||
20090253411, | |||
20100009659, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Dec 13 2006 | Broadcom Corporation | (assignment on the face of the patent) | / | |||
Jul 15 2009 | RADIOFRAME NETWORKS, INC | Broadcom Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 023044 | /0911 | |
Feb 01 2016 | Broadcom Corporation | BANK OF AMERICA, N A , AS COLLATERAL AGENT | PATENT SECURITY AGREEMENT | 037806 | /0001 | |
Jan 19 2017 | BANK OF AMERICA, N A , AS COLLATERAL AGENT | Broadcom Corporation | TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS | 041712 | /0001 | |
Jan 20 2017 | Broadcom Corporation | AVAGO TECHNOLOGIES GENERAL IP SINGAPORE PTE LTD | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 041706 | /0001 | |
May 09 2018 | AVAGO TECHNOLOGIES GENERAL IP SINGAPORE PTE LTD | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | MERGER SEE DOCUMENT FOR DETAILS | 047229 | /0408 | |
Sep 05 2018 | AVAGO TECHNOLOGIES GENERAL IP SINGAPORE PTE LTD | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENT NUMBER 9,385,856 TO 9,385,756 PREVIOUSLY RECORDED AT REEL: 47349 FRAME: 001 ASSIGNOR S HEREBY CONFIRMS THE MERGER | 051144 | /0648 | |
Sep 05 2018 | AVAGO TECHNOLOGIES GENERAL IP SINGAPORE PTE LTD | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | CORRECTIVE ASSIGNMENT TO CORRECT THE EFFECTIVE DATE PREVIOUSLY RECORDED ON REEL 047229 FRAME 0408 ASSIGNOR S HEREBY CONFIRMS THE THE EFFECTIVE DATE IS 09 05 2018 | 047349 | /0001 |
Date | Maintenance Fee Events |
Dec 17 2018 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Dec 12 2022 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Date | Maintenance Schedule |
Jun 16 2018 | 4 years fee payment window open |
Dec 16 2018 | 6 months grace period start (w surcharge) |
Jun 16 2019 | patent expiry (for year 4) |
Jun 16 2021 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jun 16 2022 | 8 years fee payment window open |
Dec 16 2022 | 6 months grace period start (w surcharge) |
Jun 16 2023 | patent expiry (for year 8) |
Jun 16 2025 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jun 16 2026 | 12 years fee payment window open |
Dec 16 2026 | 6 months grace period start (w surcharge) |
Jun 16 2027 | patent expiry (for year 12) |
Jun 16 2029 | 2 years to revive unintentionally abandoned end. (for year 12) |